I have a question regarding the Offensive Security Wireless Test. You are supposed to connect remotely to the test site and use a terminal to attack the routers. I've never done anything like this before (used to the multiple selection tests) and I wanted to see if anyone that has taken the test can clear some doubts:

When you log in do you actually open a terminal and see a BT machine and work from that or do you log in and open a putty terminal and work from that?

I passed mine a couple weeks ago as well. I've been meaning to write a review.

Agoonie, the v3 additions were a nice improvement. v2 was always good for WEP, but it has felt dated for a long time. I thought the GPU RT generation with Pyrit was pretty slick. I have a decent GPU because I'm a bit of gamer, and it was interesting to see how that fared against the i7.

The actual exam is still v2, and I think there is still room for growth there (i.e. client attacks with karmetasploit, etc.).

Last edited by dynamik on Tue Mar 27, 2012 9:57 am, edited 1 time in total.

I passed mine a couple weeks ago as well. I've been meaning to write a review.

Agoonie, the v3 additions were a nice improvement. v2 was always good for WEP, but it has felt dated for a long time. I thought the GPU RT generation with Pyrit was pretty slick. I have a decent GPU because I'm a bit of gamer, and it was interesting to see how that fared against the i7.

The actual exam is still v2, and I think there is still room for growth there (i.e. client attacks with karmetasploit, etc.).

Thanks for the heads up. I figured I would take it later this year to see what they improved on. It sounds cool so I am sure I will find the time at some point. Did they have anything on attacking WPA2 Enterprise? I found some people talking about it but I do not remember if the OffSec guys had anything. Meh, either way, I am going to take the new course.

Thanks everyone!!!! I took version 3 and both the cowpatty and rogue access point modules were really good, both on video and the text. You can set up and use both topics really fast. Unfortunately none were used on the test.

I tried cowpatty for the WPA but it wasn't even installed on the attack machine, so yes it's still a v2 exam, but lots of fun. I started the exam and for those weird reasons after 1/2 hour I was no able to crack my first target!!!!!!!!!!

I decided to move to the other 2 and I was done with those in about 25 minutes with all the documentation and everything. Then I took a breather and cracked the first one in 15 minutes, so in all I spent 1 hour and 40 minutes cracking, writing and getting screenshots and 2 hours setting the report.

I agree that later on they should add rogue access point and karmetasploit attacks to the exam. Maybe have 5 targets to attack and make it 6-8 hours to do the test. I really recommend this class to anyone!!!!!